Title | DDoS attack Detection and Mitigation in Software Defined Networks |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Sumantra, I., Gandhi, S. Indira |
Conference Name | 2020 International Conference on System, Computation, Automation and Networking (ICSCAN) |
Keywords | Botnet, composability, Computer crime, computer network management, computer network security, DDoS attack detection, DDoS attack mitigation, denial-of-service attack, distributed denial of service, distributed denial of service attack, distributed source, Entropy, Floods, HTTP attacks, Human Behavior, Internet, invasive software, IP networks, Metrics, network flow data, network management complexity, Ping flood attack, pubcrawl, resilience, Resiliency, Servers, slow HTTP attack, software defined networking, Software Defined Networks, TCP flags, TCP SYN flood attack, telecommunication control, telecommunication traffic, transport protocols |
Abstract | This work aims to formulate an effective scheme which can detect and mitigate of Distributed Denial of Service (DDoS) attack in Software Defined Networks. Distributed Denial of Service attacks are one of the most destructive attacks in the internet. Whenever you heard of a website being hacked, it would have probably been a victim of a DDoS attack. A DDoS attack is aimed at disrupting the normal operation of a system by making service and resources unavailable to legitimate users by overloading the system with excessive superfluous traffic from distributed source. These distributed set of compromised hosts that performs the attack are referred as Botnet. Software Defined Networking being an emerging technology, offers a solution to reduce network management complexity. It separates the Control plane and the data plane. This decoupling provides centralized control of the network with programmability and flexibility. This work harness this programming ability and centralized control of SDN to obtain the randomness of the network flow data. This statistical approach utilizes the source IP in the network and various attributes of TCP flags and calculates entropy from them. The proposed technique can detect volume based and application based DDoS attacks like TCP SYN flood, Ping flood and Slow HTTP attacks. The methodology is evaluated through emulation using Mininet and Detection and mitigation strategies are implemented in POX controller. The experimental results show the proposed method have improved performance evaluation parameters including the Attack detection time, Delay to serve a legitimate request in the presence of attacker and overall CPU utilization. |
DOI | 10.1109/ICSCAN49426.2020.9262408 |
Citation Key | sumantra_ddos_2020 |